From The Hacker News

  • SittingOnPebbles
    link
    fedilink
    11 year ago

    I use a ssh server on my notebook to sync files. is having public key authentification enough to mitigate this attack? are only ssh servers attacked which use password auth. ?